General

  • Target

    Homsa.apk

  • Size

    8.6MB

  • Sample

    240522-pf8glaaa59

  • MD5

    0ace9f345bcdd194048827f2c3deaaf1

  • SHA1

    7382f7d075afba92e586c89e82de42f32b6d5d47

  • SHA256

    cd02acb157e57ca60729f5fba8e4820a6601ec5ca438b11df195be471efc1220

  • SHA512

    ac6c55b271d5574ee10de1667a2ec7041b0cd184a41a606faa3681136f54ab48bac1f17cddd5f90bdecd25e2ca992193860ac13dc077da282806cc137b39bc53

  • SSDEEP

    196608:5nOR5bq9vreDeWo8SgaJo3MPGwXcdwE/Qsjx9sY8zN9da7a:VOXW9vKeWodgaJEMHOwEzjx8zDs+

Malware Config

Targets

    • Target

      Homsa.apk

    • Size

      8.6MB

    • MD5

      0ace9f345bcdd194048827f2c3deaaf1

    • SHA1

      7382f7d075afba92e586c89e82de42f32b6d5d47

    • SHA256

      cd02acb157e57ca60729f5fba8e4820a6601ec5ca438b11df195be471efc1220

    • SHA512

      ac6c55b271d5574ee10de1667a2ec7041b0cd184a41a606faa3681136f54ab48bac1f17cddd5f90bdecd25e2ca992193860ac13dc077da282806cc137b39bc53

    • SSDEEP

      196608:5nOR5bq9vreDeWo8SgaJo3MPGwXcdwE/Qsjx9sY8zN9da7a:VOXW9vKeWodgaJEMHOwEzjx8zDs+

    • Checks if the Android device is rooted.

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Checks if the internet connection is available

    • Reads information about phone network operator.

    • Schedules tasks to execute at a specified time

      Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

MITRE ATT&CK Matrix

Tasks